Research Library

Powered by

Risk Management Research

  • The Rising Face of Cyber Crime Ransomware

    Sponsored by: BitSight

    Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.

  • Disaster Recovery’s Treacherous Terrain

    Sponsored by: IBM

    Can your business continuity team navigate today's challenging environment? Access this infographic to take a look at today's DR landscape, and discover how other pros are using analytics to predict service disruptions, all under the pressure of meeting rapidly rising business leaders' expectations of DR capabilities.

  • Assess Your Open File Shares to Combat Security, Compliance Risk

    Sponsored by: STEALTHbits

    Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.

  • Risk Assessment

    Sponsored by: STEALTHbits

    In as little as 5 hours, you'll learn your top 5 data security vulnerabilities and get insight on how to patch them up.

  • Risk Assessment Infographic

    Sponsored by: STEALTHbits

    Organizations looking to gain actionable insight into their security risks may benefit from a risk assessment. Compare your company to risk statistics in this infographic, and find out how you can assess how safe or risk-prone your organization is.

  • Inside the 2016 Verizon Data Breach Investigations Report

    Sponsored by: Intel Security

    Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.

  • Guidance on Healthcare Ransomware Attacks

    Sponsored by: OpenDNS

    Learn from the U.S. Department of Health and Human Services on how to know if your healthcare organization is under attack from ransomware, how to recover, and how to know if HIPAA has been violated.

  • Five Important Steps to Ransomware Remediation in Health IT

    Sponsored by: OpenDNS

    Discover five key steps for responding to hospital ransomware attacks within this e-guide. Health IT expert Reda Chouffani will help you better understand the anatomy of ransomware and help you devise a recovery plan if ransomware should strike.

  • TAG Cyber Report: 2017 Security Annual – Vol. 1

    Sponsored by: Digital Guardian

    This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.

  • Penetration Testing Services Data Sheet

    Sponsored by: IBM

    Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.

  • Deriving Value from the Technical Security Test

    Sponsored by: SecureWorks

    Uncover a guide for your questions as you get into the process of choosing the right provider to meet your specific security testing needs. Learn key considerations that must be implemented in the selection process for technical testing providers.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value

    Sponsored by: Palo Alto Networks

    Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.

  • Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility

    Sponsored by: SecureWorks

    Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause.

  • Cyber Security Recommendations from the C-Suite

    Sponsored by: Radware

    From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.

  • How GuideStar Stabilized Website Availability by Blocking Bad Bots

    Sponsored by: Distil Networks

    Learn how GuideStar countered their invasive bot problem, stabilized their site to recover 99.7% uptime, and still allowed good traffic to get through unhindered. Also discover how they saved 20 hours a month of IT effort and reigned in an out-of-control issue that seemed insurmountable.

  • Nucleus Research Guidebook: IBM QRadar on Cloud

    Sponsored by: IBM

    Learn how to eliminate the need for expensive hardware and IT personnel oversight by utilizing the cloud. Deploy quickly and achieve faster time to value with a growing range of additional cloud security services. Realize the benefits of a managed cloud infrastructure and more through this brief resource.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • Security Framework: A Guide for Business Leaders

    Sponsored by: Palo Alto Networks

    Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.

  • The Insider Threats: Be Protected with Advanced DNS Security

    Sponsored by: EfficientIP

    See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.

  • Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture

    Sponsored by: EfficientIP

    Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • New Tools Lead to Refined GRC Practices

    Sponsored by: Proofpoint, Inc.

    See why most enterprises still struggle with governance, risk and compliance processes in the digital age. In this e-guide, learn the history of tried and failed document sorting methods and discover new tools, like text analytics and auto-classification that can help compliance practices in the future.

  • NSS Labs 2016 Breach Detection System (BDS) Group Test Results

    Sponsored by: Fortinet, Inc.

    Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection.

  • Fight Unwanted Intrusions with Multi-Layered Security

    Sponsored by: Fortinet, Inc.

    Discover how to make your security systems work together as one. Learn how to achieve better communication between existing security tools and stop known threats, unknown threats, APTs and prevent future breaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.